HomeSort by relevance Sort by last modified time
    Searched full:stun (Results 26 - 50 of 75) sorted by null

12 3

  /external/webrtc/webrtc/p2p/base/
relayport.cc 50 // Validates a response to a STUN allocate request.
56 // Sends a STUN allocate request message to the relay server.
63 // already STUN intended for the server, so no wrapping is necessary.
75 // packet in a STUN send / data indication.
99 // Sends the STUN requests to the server to initiate this connection.
108 // entry. This will wrap the packet in STUN if necessary.
243 // This is due to as mapped address stun attribute is used for allocated
567 // Otherwise, we must wrap the given data in a STUN SEND request so that we
709 LOG(INFO) << "Incoming packet was not STUN";
713 // The incoming packet should be a STUN ALLOCATE response, SEND response, o
    [all...]
stun.cc 11 #include "webrtc/p2p/base/stun.h"
128 // Verifies a STUN message has a valid MESSAGE-INTEGRITY attribute, using the
137 // Getting the message length from the STUN header.
143 // Finding Message Integrity attribute in stun message.
178 // Stun message has other attributes after message integrity.
179 // Adjust the length parameter in stun message to calculate HMAC.
184 // Writing new length of the STUN message @ Message Length in temp buffer.
188 // |0 0| STUN Message Type | Message Length |
245 // Verifies a message is in fact a STUN message, by performing the checks
302 // and version is always 2 (10). If set, this is not a STUN packet
    [all...]
relayserver.h 19 #include "webrtc/p2p/base/stun.h"
99 // Processes the relevant STUN request types from the client.
153 // Sends a STUN message to the connected client with no wrapping.
relayserver.cc 45 // Sends the given STUN message on the given socket.
54 // Constructs a STUN error response and sends it on the given socket.
190 // If this did not come from an existing connection, it should be a STUN
200 // Handle STUN requests to the server itself.
249 // The first packet should always be a STUN / TURN packet. If it isn't, then
254 LOG(LS_WARNING) << "Dropping packet: first packet not STUN";
300 // Parse this into a stun message. Eat the message if this fails.
327 // Make sure this is a valid STUN request.
387 // Make sure this is a valid STUN request.
stunserver.cc 30 // Parse the STUN message; eat any messages that fail to parse.
turnport.cc 16 #include "webrtc/p2p/base/stun.h"
27 // TODO(juberti): Move to stun.h when relay messages have been renamed.
157 // This will wrap the packet in STUN if necessary.
356 // TCP port is ready to send stun requests after the socket is connected,
401 state_ = STATE_CONNECTED; // It is ready to send stun requests.
458 // A TURN port will have two candiates, STUN and TURN. STUN may not
459 // present in all cases. If present stun candidate will be added first
541 // This is to guard against a STUN response from previous server after
571 "Ignoring STUN binding response message on shared socket."
    [all...]
basicpacketsocketfactory.cc 14 #include "webrtc/p2p/base/stun.h"
163 // Finally, wrap that socket in a TCP or STUN TCP packet socket.
stunrequest.cc 129 // Parse the STUN message and continue processing as usual.
134 LOG(LS_WARNING) << "Failed to read STUN response " << rtc::hex_encode(id);
stunrequest_unittest.cc 156 LOG(LS_INFO) << "STUN request #" << (i + 1)
175 rtc::Thread::Current()->ProcessMessages(10000); // > STUN timeout
port_unittest.cc 97 // Stub port class for testing STUN generation and processing.
167 // in STUN binding requests.
536 case NAT_OPEN_CONE: return "stun(open cone)";
537 case NAT_ADDR_RESTRICTED: return "stun(addr restricted)";
538 case NAT_PORT_RESTRICTED: return "stun(port restricted)";
539 case NAT_SYMMETRIC: return "stun(symmetric)";
540 default: return "stun(?)";
    [all...]
stunserver_unittest.cc 108 "look anything like a normal stun message";
testturnserver.h 18 #include "webrtc/p2p/base/stun.h"
stun_unittest.cc 13 #include "webrtc/p2p/base/stun.h"
67 // Returns the size the stun message should report itself as being
76 // Sample STUN packets with various attributes
211 // The actual length in bytes of the invalid messages (including STUN header)
247 // RTCP packet, for testing we correctly ignore non stun packet types.
257 // Software name (request): "STUN test client" (without quotes)
264 static const char kRfc5769SampleMsgClientSoftware[] = "STUN test client";
595 // Read the RFC5389 fields from the RFC5769 sample STUN request.
623 // Read the RFC5389 fields from the RFC5769 sample STUN response.
646 // Read the RFC5389 fields from the RFC5769 sample STUN response for IPv6
    [all...]
p2ptransportchannel_unittest.cc 72 // The address of the public STUN server.
120 // We also run a STUN server and a relay server on the virtual network to allow
454 // local to stun based on the test type.
458 // i.e. when don't match its remote type is either local or stun.
    [all...]
tcpport.cc 17 * - Writable: Whether the stun binding is completed. Sending a data packet
18 * before stun binding completed will trigger IPC socket layer to shutdown
53 * | | Stun Binding Completed |
58 * 1 -----------+ 2 -----------+Stun 3 -----------+
371 // Process the STUN response before we inform upper layer ready to send.
transport.h 100 bool writable; // Has this connection received a STUN response?
104 size_t rtt; // The STUN RTT for this connection.
turnport.h 39 STATE_CONNECTED, // Socket connected, ready to send stun requests.
213 // Stun address from allocate success response.
  /external/webrtc/webrtc/p2p/client/
basicportallocator.cc 326 // during stun process.
778 // Already got this STUN servers covered.
896 // If shared socket is enabled, STUN candidate will be allocated by the
902 // If STUN is not disabled, setting stun server address to port.
906 << "STUN candidate generation.";
938 LOG(LS_VERBOSE) << "AllocationSequence: STUN ports disabled, skipping.";
948 << "AllocationSequence: No STUN server configured, skipping.";
    [all...]
basicportallocator.h 222 // Returns addresses of both the explicitly configured STUN servers,
223 // and TURN servers that should be used as STUN servers.
  /external/webrtc/webrtc/p2p/stunprober/
stunprober.cc 24 #include "webrtc/p2p/base/stun.h"
41 // STUN servers
46 // Actual time the STUN bind request was sent.
51 // Server reflexive address from STUN response for this given request.
153 // The write must succeed immediately. Otherwise, the calculating of the STUN
176 // Invalid or incomplete STUN packet.
  /external/webrtc/talk/app/webrtc/
peerconnection_unittest.cc 774 ice_server.uri = "stun:stun.l.google.com:19302";
    [all...]
peerconnection.cc 79 // The default stun port.
85 static const char* kValidIceServiceTypes[] = {"stun", "stuns", "turn", "turns"};
90 STUN = 0, // Indicates a STUN server.
91 STUNS, // Indicates a STUN server used with a TLS session.
137 // stunURI = scheme ":" stun-host [ ":" stun-port ]
138 // scheme = "stun" / "stuns"
139 // stun-host = IP-literal / IPv4address / reg-name
140 // stun-port = *DIGI
    [all...]
  /external/webrtc/webrtc/base/
natserver.h 53 // then sending the remote address in quasi-STUN format. The connection status
  /external/webrtc/talk/app/webrtc/test/
peerconnectiontestwrapper.cc 93 ice_server.uri = "stun:stun.l.google.com:19302";
  /external/webrtc/talk/app/webrtc/objc/public/
RTCPeerConnection.h 102 // Any changes to STUN/TURN servers or ICE candidate policy will affect the

Completed in 275 milliseconds

12 3